Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3956: SQL Injection in xierongwkhd weimai-wetapp

0
Medium
VulnerabilityCVE-2026-3956cvecve-2026-3956
Published: Wed Mar 11 2026 (03/11/2026, 20:32:11 UTC)
Source: CVE Database V5
Vendor/Project: xierongwkhd
Product: weimai-wetapp

Description

CVE-2026-3956 is a medium-severity SQL injection vulnerability in the xierongwkhd weimai-wetapp product, specifically in the getAdmins function of the Admin_AdminUserController. java file. The vulnerability arises from improper sanitization of the 'keyword' argument, allowing remote attackers to manipulate SQL queries. Exploitation does not require user interaction but does require high privileges. The vulnerability affects a specific commit version, with no clear patched release due to the product's rolling release model. Although no known exploits are currently in the wild, a public exploit exists. This flaw can lead to partial compromise of confidentiality, integrity, and availability of the affected system. Organizations using this software should prioritize code review and input validation to mitigate risk. Countries with significant deployments of this product or similar Java-based web applications are at higher risk. The CVSS 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:31:11 UTC

Technical Analysis

CVE-2026-3956 identifies a SQL injection vulnerability in the xierongwkhd weimai-wetapp software, specifically in the getAdmins function located in the Admin_AdminUserController.java source file. The vulnerability is triggered by manipulation of the 'keyword' parameter, which is improperly sanitized before being incorporated into SQL queries. This allows an attacker with high privileges to remotely execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or disruption of database operations. The product follows a rolling release model, complicating version tracking and patch management. Although the vendor has been notified, no official patch or response has been issued yet. The vulnerability does not require user interaction but does require the attacker to have high-level privileges, limiting the attack surface. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required for attack (though the vector states PR:H, meaning privileges are required), no user interaction, and low impact on confidentiality, integrity, and availability. The exploit code is publicly available, increasing the risk of exploitation despite no current reports of active attacks. This vulnerability highlights the importance of secure coding practices, particularly input validation and parameterized queries in Java-based web applications.

Potential Impact

The SQL injection vulnerability in weimai-wetapp can lead to unauthorized access to sensitive administrative data, data corruption, or denial of service by manipulating backend database queries. Since the vulnerability requires high privileges, the immediate risk is somewhat contained to users or attackers who have already gained elevated access, but it can be leveraged to escalate privileges or move laterally within the system. The presence of a public exploit increases the risk of opportunistic attacks, especially in environments where the software is deployed without additional security controls. Organizations relying on this software for administrative user management could face data breaches, loss of data integrity, and operational disruptions. The rolling release nature of the product complicates patch management, potentially prolonging exposure. The medium CVSS score reflects moderate risk, but the impact could be higher in environments with sensitive data or critical operations. Overall, this vulnerability poses a tangible threat to confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

To mitigate CVE-2026-3956, organizations should immediately audit the usage of the 'keyword' parameter within the getAdmins function and refactor the code to use parameterized queries or prepared statements to prevent SQL injection. Implement strict input validation and sanitization for all user-supplied inputs, especially those used in database queries. Employ web application firewalls (WAFs) with SQL injection detection rules to provide an additional layer of defense. Monitor logs for unusual database query patterns or failed injection attempts. Since the vendor has not released a patch, consider isolating or restricting access to the affected administrative interfaces to trusted networks or VPNs. Conduct thorough code reviews and penetration testing focused on injection flaws. If possible, engage with the vendor or community to obtain updates or patches. Finally, maintain regular backups and have an incident response plan ready in case of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-11T12:33:44.870Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1d4422f860ef9437718ae

Added to database: 3/11/2026, 8:44:50 PM

Last enriched: 3/19/2026, 2:31:11 AM

Last updated: 4/25/2026, 11:20:39 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses